Watermarking digital image and video data. A state-of-the-art overview
GC Langelaar, I Setyawan… - IEEE Signal processing …, 2000 - ieeexplore.ieee.org
Watermarking digital image and video data. A state-of-the-art overview Page 1 20 IEEE
SIGNAL PROCESSING MAGAZINE SEPTEMBER 2000 A State-of-the-Art Overview In the past …
SIGNAL PROCESSING MAGAZINE SEPTEMBER 2000 A State-of-the-Art Overview In the past …
A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm
HR Kanan, B Nazeri - Expert systems with applications, 2014 - Elsevier
Steganography is knowledge and art of hiding secret data into information which is largely
used in information security systems. Various methods have been proposed in the literature …
used in information security systems. Various methods have been proposed in the literature …
Survey of wavelet-domain watermarking algorithms
P Meerwald, A Uhl - Security and watermarking of multimedia …, 2001 - spiedigitallibrary.org
In this paper, we will provide an overview of the wavelet-based watermarking techniques
available today. We will see how previously proposed methods such as spread-spectrum …
available today. We will see how previously proposed methods such as spread-spectrum …
Optimal differential energy watermarking of DCT encoded images and video
GC Langelaar, RL Lagendijk - IEEE Transactions on image …, 2001 - ieeexplore.ieee.org
This paper proposes the differential energy watermarking (DEW) algorithm for JPEG/MPEG
streams. The DEW algorithm embeds label bits by selectively discarding high frequency …
streams. The DEW algorithm embeds label bits by selectively discarding high frequency …
A new decoder for the optimum recovery of nonadditive watermarks
M Barni, F Bartolini, A De Rosa… - IEEE transactions on …, 2001 - ieeexplore.ieee.org
Watermark detection, ie, the detection of an invisible signal hidden within an image for
copyright protection or data authentication, has classically been tackled by means of …
copyright protection or data authentication, has classically been tackled by means of …
[PDF][PDF] Wavelet based image adaptive watermarking scheme
N Kaewkamnerd, KR Rao - Electronics letters, 2000 - Citeseer
Wavelet based image adaptive watermarking Scheme Page 1 1 Wavelet based image
adaptive watermarking Scheme N. Kaewkamnerd and KR Rao We propose an image adaptive …
adaptive watermarking Scheme N. Kaewkamnerd and KR Rao We propose an image adaptive …
Стеганографические системы. Атаки, пропускная способность каналов и оценка стойкости
ВГ Грибунин, ВЕ Костюков, АП Мартынов… - 2015 - elibrary.ru
Развитие средств вычислительной техники в последнее десятилетие дало новый
толчок развитию компьютерной стеганографии. Появилось много новых областей …
толчок развитию компьютерной стеганографии. Появилось много новых областей …
Optimal transform domain watermark embedding via linear programming
S Pereira, S Voloshynoskiy, T Pun - Signal processing, 2001 - Elsevier
Invisible digital watermarks have been proposed as a method for discouraging illicit copying
and distribution of copyright material. In recent years, it has been recognized that …
and distribution of copyright material. In recent years, it has been recognized that …
Watermarking of MPEG-4 video objects
M Barni, F Bartolini, N Checcacci - IEEE Transactions on …, 2005 - ieeexplore.ieee.org
The recent finalization of MPEG-4 will make this standard very attractive for a large range of
applications such as video editing, Internet video distribution, wireless video …
applications such as video editing, Internet video distribution, wireless video …
[PDF][PDF] Ensuring the Data Integrity in Infocommunication Systems
V Pevnev, A Frolov, M Tsuranov… - International Journal of …, 2022 - researchgate.net
The article is devoted to the study of the perspectives of steganography to ensure integrity.
The definition of information integrity is presented, which meets the new requirements and …
The definition of information integrity is presented, which meets the new requirements and …